Governing the Ungovernable?

Total Page:16

File Type:pdf, Size:1020Kb

Governing the Ungovernable? Virtual Spaces & Virtual Layers – Governing the Ungovernable? Online multi-user platforms like World of Warcraft and Twitter have one common regulatory mechanism; the End User License Agreement. This document forms the cornerstone of the regulatory system within each of these spaces. Yet it is regularly contravened by users and providers alike. These agreements are very often the only forms of control or regulation that are present in online environments and therefore control more than user behaviour. Yet these platforms also share another feature: virtual disputes, but these are no longer confined online. Threats of violence and other criminal offences arise too, with examples including the abuse issued to Criado-Perez, and more recently, Flipovic. Criado-Perez suffered Twitter abuse and Flipovic was victimised on online message boards. Cyberspace was once deemed to be free from governmental control but the increasing disputes suggest there is now a need to consider how users of spaces such as online games, virtual worlds and social media are protected. Is it fair and practical to leave regulation to EULAs? How do users achieve redress for wrongs – through online and in-site governance mechanisms or wider controls? This work will consider some of these issues, and will suggest that there is now a need for additional layers of regulation to fill the ‘responsibility gap’ left between EULAs and the offline legal mechanisms. Introduction Virtual worlds, online social media sites, virtual communities and even MMORPGs1 have had a chequered past, experiencing exponential growth in user numbers and subscriber bases. Facebook has truly global reach, with an estimated 1.23 billion worldwide users engaging with, or using the site regularly. 2 This alone, in the opinion of Kiss is one way in which the Internet (and our uses of it) have been rapidly transformed – we are longer merely using the Internet, we are part of it, and our interactions contribute to it.3 Facebook is however, only one example of one platform – there are a multitude of others, offering slightly different versions of a similar experience or similar service. Twitter for example, it is estimated, has over 400 million users, and sees over 500 million tweets per day. 4 This is not the only example of an online platform with mass user numbers – World of Warcraft, the most popular 1 Massively Multiplayer Online Role Playing Games; hereafter MMORPGs. 2 J Kiss, ‘Facebook’s 10th Birthday: from college dorm to 1.23 billion users.’ The Guardian (4 February 2014) <http://www.theguardian.com/technology/2014/feb/04/facebook-10-years-mark- zuckerberg> accessed 4 September 2015. 3 E Reuveni, ‘On Virtual Worlds: Copyright and Contract Law At the Dawn of the Virtual Age’ [2007] 82 Indiana L J 261, 264; Garlick M, ‘Player, Pirate or Conducer? A Consideration of the Rights of Online Gamers’ (2004-2005) Yale Jou of Law & Tech 424. 4 R Holt, ‘Twitter in Numbers.’ The Telegraph (21 March 2013) <http://www.telegraph.co.uk/technology/twitter/9945505/Twitter-in-numbers.html> accessed 4 September 2015. online game in history peaked at 12 million subscribers. 5 Whilst this is just a very small sample of some of the leading online platforms, these figures indicate that there is a very high level of interactivity across a number of platforms. Whilst the Internet and cyberspace was once deemed to be free from governmental control and claims of governmental sovereignty, 6 is there now a need to consider how users of spaces such as online games, virtual worlds and social media are protected? Is it fair and practical to leave regulation to EULAs? How do users achieve justice – through in-world and in-site governance mechanisms or wider controls? This paper will consider the current regulatory mechanisms operating across online platforms including social media sites and online gaming platforms, and question, in light of some prescient examples, whether the current forms of control are suited to allowing users to enjoy their online interactions whilst also ensuring that there are adequate provisions to allow disputes to be resolved in the interests of all of the parties concerned. Whilst this development of ‘new’ forms of interaction has blossomed to the extent that Ofcom reports 50% of our time is now spent online, 7 these changes in our social behaviours also present a number of challenges, not only in terms of our changing social realities, but also in terms of new forms of potentially deviant and undesirable behaviour arising through interactions with these online platforms. Of course, within any discussion of online platforms, especially ones dealing with control and governance, there are questions of the division between the online or virtual, and the offline or real.8 Similarly, issues of conflict of laws and jurisdictional competence arise, particularly when discussing online spaces. Again this work acknowledges that such discussions do arise, but does not engage with those aspects here. Virtual Spaces In a wide variety of online spaces, there are a wide variety of potential behaviours and activities which users can engage in. This is, in part, dependent upon the particular space – for example, in certain games, it is acceptable to seek to rape and pillage,9 whereas on Facebook or other social media sites, remarks or content connected to 5 Blizzard Entertainment, ‘World of Warcraft subscriber base reaches 12 million worldwide.’ Blizzard Entertainment Press Release (7 October 2010) <http://us.blizzard.com/en- us/company/press/pressreleases.html?101007> accessed 4 September 2015. 6 J P Barlow ‘Declaration of the Independence of Cyberspace’ EFF (8 February 1996) <https://projects.eff.org/~barlow/Declaration-Final.html> accessed 4 September 2015. 7 Ofcom ‘Consumers spend almost half of their waking hours using media and communications.’ (2010) <http://media.ofcom.org.uk/2010/08/19/consumers-spend-almost-half-of-their-waking-hours- using- media-and-communications/> accessed 4 September 2015. 8 For example, virtual communities, as identified by B Anderson, Imagined Communities: Reflections on the Origin and spread of Nationalism (Verso 1983), T Edensor, National Identities and Popular Culture (OUP 2001). But see further: D Bell, An Introduction to Cybercultures (Routledge, 2001); and F Weinreich, ‘Establishing a point of view towards virtual communities.’ (1997) 3(2) Computer- Mediated Communication <http://www.december.com/cmc/mag/1997/feb/wein.html> accessed 4 September 2015. 9 For example ‘Sociolotron’ is an adult sex game; M Whitty and G Young, ‘Rape, pillage, murder and all manner of ills: Are there some possibilities for action that should not be permissible even within gamespace?’ in K Poels & S Malliet (eds) Moral Issues in Digital Game Play, ACCO Academic (2012) 2. such behaviours would be incredibly controversial and problematic, as Twitter Trolls have recently discovered.10 It should also be noted that the situation is not always straightforward in terms of what is and is not acceptable – particularly in a gaming context. 11 It is also the situation that creating and sharing content through online platforms can be problematic – especially given the troubled private copying exception,12 introduced in October 2014, only to be overturned by the High Court in June 2015. 13 Similarly, the Amazon Reviews sections are an online space, and potentially also an online community controlled by a specific set of rules. 14 These are not the only examples however – Mumsnet, fan fic sites,15 Comment Is Free on the Guardian website are all also examples of online spaces in which users contribute, connect and interact. In a sense each of these spaces are controlled by guidelines written or unwritten, and create cyber communities, highlighted by Bowrey who suggests that there are, ‘different kinds of communities and associated cultures that intersect with the layers of self-regulation, voluntary schemes, co-regulation, legislation, and international agreements.’16 In a sense therefore, online spaces, and their associated interactions provide not only challenges to the traditional paradigms of governance and control, but also highlight the changing nature of interactions. Similarly, ‘property’ disputes – be it intellectual property or digital property – are increasingly more prevalent and predictable, yet the legal responses to them are far from predictable in the light of the private copying exception fiasco. Decisions such as that in the Google Books litigation,17 or the Second Life Linden Labs class action18 have been handed down and indicate the significance of digital properties and their host spaces. This has seemingly been recognised by the judiciary but the legal system itself has yet to adapt to such developments. Regulation is currently non-platform-specific, and relies in an online context almost exclusively on contractual agreements. This current approach means that there are gaps in the system of control – be it in the contractual agreements or in terms of the regulation of behaviours within these platforms. It is possible that there are also gaps in responsibility, which exacerbates the lack of governance and control in these online platforms. Who for example, is responsible in the current paradigm where the EULA does not deal with the dispute raised? What recourse would a wronged user have in such a situation? The next layer following the EULA under the current paradigm is usually to resort to the offline legal provisions, however, the user is then constrained by applicable law clauses in the EULAs, meaning that the chance of resolving a 10 R v Nimmo; R v Sorley (2014) (unreported) <https://www.judiciary.gov.uk/wp- content/uploads/JCO/Documents/Judgments/r-v-nimmo-and-sorley.pdf> accessed 4 September 2015. 11 See for example: M Luck, ‘The Gamer’s Dilemma: An Analysis of the arguments for the moral distinction between virtual murder and virtual paedophilia’ Ethics and Information Technology 11 (1):31-36 (2009).
Recommended publications
  • Social Networking and Digital Gaming Media Convergence: Classification and Its Consequences for Appropriation
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Salford Institutional Repository Social Networking and Digital Gaming Media Convergence: Classification and its Consequences for Appropriation Marie Griffiths, PhD and Ben Light, PhD IS, Organisations and Society Research Centre University of Salford, Maxwell Building, Salford, M5 4WT. United Kingdom. Contact Author: Professor Ben Light IS, Organisations and Society Research Centre University of Salford, Maxwell Building, Salford, M5 4WT. United Kingdom. Tel. +44 161 295 5443 Email. [email protected] Suggested running title: Social Networking and Digital Gaming Convergence Biographies Marie Griffiths moved from the IT industry into academia and is now based at the University of Salford as an EPSRC Academic Fellow. She has, and continues to research gender and ICTs. Recently she has embarked upon the study "Cybercitizens and their Virtual Pursuits" to understand the consequence of growing up and living in a technologically saturated environment. Her work has been published in journals such as Gender, Work and Organization, the European Journal of Information Systems and Information Communication and Society. Ben Light is Professor of Technology and Society at the University of Salford. His research concerns the appropriation of configurable technologies within work, organisations and society. This has led him to explore the use of large-scale enterprise resource planning packages, call centre technologies, social networking sites and digital games. He has published in journals such as Communications of the ACM, Information Systems Journal, New Technology, Work and Employment, the European Journal of Information Systems and the Journal of Information Technology.
    [Show full text]
  • Childhood Comes but Once National Strategy to Combat Violence and Sexual Abuse Against Children and Youth (2014–2017)
    Strategy Childhood comes but once National strategy to combat violence and sexual abuse against children and youth (2014–2017) Strategy Childhood comes but once National strategy to combat violence and sexual abuse against children and youth (2014–2017) 4 FOREWORD As a society, Norway has come a long way in its efforts to protect children and adolescents from violence, sexual abuse and bullying. The progress we have achieved is attributable to policy decisions, legislation, increased knowledge, public discussion, media attention and the work of professionals, parents and children themselves. We do not permit parents to harm their children, and we express collective grief and alarm when we hear of children exposed to serious abuse. To the vast majority of parents in Norway, nothing is more important than the well-being of children. All the same, violence and sexual abuse, whether in the family or elsewhere, are a part of daily life for many children. Extensive research shows how consequential violence may be, whether it is directed at a parent or the child itself, and whether it takes the form of direct physical violence, sexual abuse or bullying. Violence can lead to extensive cognitive, social, psychological and physical problems in both the short and long term. Violence against children and adolescents is a public health challenge. The approach to violence and sexual abuse against children in Norwegian society must be one of zero tolerance. We want safety and security for all children, enabling them to enjoy good health and a good quality of life as they grow. Taboos must be broken.
    [Show full text]
  • Names and Behavior: Case of the Name “Muhammad”
    International Journal of Philosophy and Theology December 2014, Vol. 2, No. 4, pp. 109-127 ISSN: 2333-5750 (Print), 2333-5769 (Online) Copyright © The Author(s). 2014. All Rights Reserved. Published by American Research Institute for Policy Development DOI: 10.15640/ijpt.v2n4a7 URL: http://dx.doi.org/10.15640/ijpt.v2n4a7 Names and Behavior: Case of the Name “Muhammad” Raja Irfan Sabir1, Farooq Nawaz2, Usman Zakir3, Maira Naeem3 & Talha Anjum3 Abstract Names have great impact on the personality and behavioral traits of a person. Muslims mostly name their children (male) on the names of Prophets (Peace be upon All) and the devoted Companions (May Allah be Pleased with All) of Prophet Muhammad (Peace be Upon Him). The name of the last Prophet “Muhammad (Peace be Upon Him)” is used with most of the names e.g. Muhammad Abu Bakar, Muhammad Umer, Muhammad Usman, Muhammad Ali, Muhammad Bilal, Muhammad Junaid, Muhammad Ahmed, etc. Very rare research has been done on the impact of name on one’s personality and behavior. Furthermore, no research has been carried out specifically by considering the name “Muhammad (Peace be Upon Him)” which is the world’s most popular name. This research is aimed at exploring the impact of the name “Muhammad (Peace be Upon Him)” on one’s personality. Keywords: Muhammad, Name, Behavior, Personality, Theory of Planned Behavior. Introduction Names do have the power to make a child's identity and self-esteem and it also has impact on how he has been treated and seen by other people (Miller & Harrison, 2007). In western countries, just like music, clothes and hairstyles names come and go in fashion cycle.
    [Show full text]
  • Guy Fawkes, from Villain to Icon
    FACULTAD de FILOSOFÍA Y LETRAS DEPARTAMENTO de FILOLOGÍA INGLESA Grado en Estudios Ingleses TRABAJO DE FIN DE GRADO Guy Fawkes, from villain to icon Rafael Calle Cardona Tutor: Berta Cano Echevarría 2016-2017 1 2 ABSTRACT In this dissertation, I will be explaining and analyzing the changes that the historical figure of Guy Fawkes underwent from being one of the most hated figures in England, with an annual celebration to commemorate his death, to a fictional character representing the fight against totalitarianism in the late 20th century. And finally, how, in the early years of the 21st century he became the face of the international hacktivist group known as Anonymous. Furthermore, I will be analyzing the historical context in which the character of Guy Fawkes was conceived as well as explaining why he was the main figure who was accounted responsible for the Gunpowder Plot despite the fact that he was not its leader. Moreover, I will analyze why the group Anonymous chose the “Fawkesque” mask from the character from the graphic novel as well as the movie V for Vendetta which was at the same time inspired in the historical character, to become the face of the 21st century hacktivist movement. Keyword: Guy Fawkes, England, Anonymous, Hacktivism, V for Vendetta, Gunpowder Plot. En este trabajo, explicaré y analizaré los cambios que sufrió la figura histórica de Guy Fawkes, de ser una de las más odiadas en Inglaterra, con una celebración anual que para conmemorar su muerte, a un personaje de ficción que representa la lucha contra el totalitarismo en la segunda mitad del siglo XX.
    [Show full text]
  • Thesis (844.6Kb)
    ABSTRACT You Should Have Expected Us – An Explanation of Anonymous Alex Gray Director: Linda Adams; PhD Anonymous is a decentralized activist collective that has evolved using the technology of the information age. This paper traces its origins as a way of contextualizing and better understanding its actions. The groups composition is examined using its self‐ascribed imagery to illustrate its’ unique culture and relational norms. Its structure and motivation are analyzed using the framework developed for social movements and terrorist networks. Finally a discussion of a splinter cell and official reaction delineate both strengths and weaknesses of the movement while suggesting its future development. The conclusion serves to expound on the ideal end for the online anonymous community as a new frontier in meritocratic activism. APPROVED BY DIRECTOR OF HONORS THESIS: ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ Dr. Linda Adams, Department of Political Science APPROVED BY THE HONORS PROGRAM: ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ Dr. Andrew Wisely, Director. DATE: ________________________ YOU SHOULD HAVE EXPECTED US AN EXPLANATION OF ANONYMOUS A Thesis Submitted to the Faculty of Baylor University In Partial Fulfillment of the Requirements for the Honors Program By Alex Gray Waco, Texas May 2012 TABLE OF CONTENTS Preface iii Acknowledgements iv Dedication v CHAPTER ONE 1 Introduction CHAPTER TWO 4 The Story of Anonymous CHAPTER THREE 20 A Group with No Head and No Members CHAPTER FOUR 39 Activists or Terrorists CHAPTER FIVE 56 Distraction, Diversion, Division CHAPTER SIX 67 Conclusion Bibliography 71 ii PREFACE Writing a paper about a decentralized, online collective of similarly minded individuals presents a unique set of challenges. In spending so much time with this subject, it is my goal to be both intellectually honest and as thorough as I can be.
    [Show full text]
  • Hacktivism Cyberspace Has Become the New Medium for Political Voices
    White Paper Hacktivism Cyberspace has become the new medium for political voices By François Paget, McAfee Labs™ Table of Contents The Anonymous Movement 4 Origins 4 Defining the movement 6 WikiLeaks meets Anonymous 7 Fifteen Months of Activity 10 Arab Spring 10 HBGary 11 The Sony ordeal 11 Lulz security and denouncements 12 Groups surrounding LulzSec 13 Green rights 14 Other operations 15 AntiSec, doxing, and copwatching 16 Police responses 17 Anonymous in the streets 18 Manipulation and pluralism 20 Operation Megaupload 21 Communications 21 Social networks and websites 21 IRC 22 Anonymity 23 DDoS Tools 24 Cyberdissidents 25 Telecomix 26 Other achievements 27 Patriots and Cyberwarriors 28 Backlash against Anonymous 29 TeaMp0isoN 30 Other achievements 30 Conclusion 32 2 Hacktivism What is hacktivism? It combines politics, the Internet, and other elements. Let’s start with the political. Activism, a political movement emphasising direct action, is the inspiration for hacktivism. Think of Greenpeace activists who go to sea to disrupt whaling campaigns. Think of the many demonstrators who protested against human rights violations in China by trying to put out the Olympic flame during its world tour in 2008. Think of the thousands of activists who responded to the Adbusters call in July 2011 to peacefully occupy a New York City park as part of Occupy Wall Street. Adding the online activity of hacking (with both good and bad connotations) to political activism gives us hacktivism. One source claims this term was first used in an article on the filmmaker Shu Lea Cheang; the article was written by Jason Sack and published in InfoNation in 1995.
    [Show full text]
  • Social Media, Politics and the State Two)
    4 Anonymous Hacktivism and Contemporary Politics Christian Fuchs 1. INTRODUCTION It is Friday, August 6, 2012, on the Internet. Sixty-seven years earlier, on August 6, 1945, the U.S. dropped the first atom bomb on Hiroshima. One hears a song by Trey Parker: "America. Fuck yeah. [. .] So lick my butt and suck on my balls, America, fuck yeah! Whatcha' gonna do when we come for you now? (. .) McDonalds, fuck yeah! Wal-Mart, fuck yeah!" Pictures of cats that look human are accompanied by the request, "I want to start a collection of my fetish catboys so post moar!" There is a link to a live cam on Times Square. One also finds an image showing a burning American flag that is accompanied by the logos of McDonald's and images of a can of Mountain Dew, the Statue of Liberty, a guitar player and a screaming bear. "You should kill yourself, fucking AMERRRICCAAA, you little fag- got." A rapper writes a new song and says that the first few minutes of the discussion in his thread will become part of the song. There is a story about a brother who tries to seduce his sister, but it turns out that his sister is a large arthropod. There is a thread with images of female but- tocks, accompanied by an announcement that one of the portrayed girls receives prank phone calls. One sees a picture of a couple having oral sex accompanied by the text "PORNO FUCK YEAH!" as well as a picture of a drunk sleeping man accompanied by the text "buddy passed out after 11 Coors lights and 2 bud lights" and the suggestion that a game will decide what the person who posted the picture will do to the drunk.
    [Show full text]
  • VIRTUAL TOURISM of HABBO UK USERS Final Paper Presented In
    VIRTUAL TOURISM OF HABBO UK USERS Final paper presented in MIT6 Media in Transition Conference (Boston, Mass., US, April 24-26, 2009) Marjoriikka Ylisiurua Sulake Corporation, Helsinki, Finland Peter Durant Sulake United Kingdom, London, UK Abstract Habbo, an open social virtual world, attracting millions of teenaged users monthly, consists of 31 local internet communities around the world. Every Habbo site operates in a different country in the local language, and despite similarity of activities and appearance, all communities form their own culture by making its own additions and translations to the globally coordinated elements. Having been grown to have its own customs and codes of conduct, every local Habbo has its own traits, making them worthy targets of virtual tourism within the Habbo realm. With United Kingdom -based teenagers as examples, we investigated the phenomenon of virtual tourism in Habbo virtual world. We perceive British teenagers as defining themselves as global citizens: they form a proud national core identity, are familiar with multi-national or international identities, and are interested in travelling and exploration. In real-life, this ‘glocal’ youth is held back by age, money and opportunity; virtual travelling offers them a way to new experiences. A local campaign in Habbo UK was designed during late 2008 for the predominantly British Habbo UK user to create virtual spaces for their peers to travel virtually within. The result was a thoughtfully executed representation of a local virtual community’s idea of separate real life scenes in different countries; the success of the campaign showed the users’ wish for travel and the desire to express national identity.
    [Show full text]
  • 'Revelations: the 11 Years of Taivas'
    Where else? “The world’s biggest hotel has its headquarters right in the centre of Helsinki.” Timo Soininen, CEO, Sulake Corporation “Sulake’s thing is community-based entertain- ment. People are the best entertainment.” Step inside, and just believe it: Habbo Hotel has either to just bump into random strangers on the unless there are other people there. The entire seven million visitors every month. street and start talking to them. service rests on a fundamental human need, the At Habbo’s headquarters, a rather impressive And it makes no sense – or at least it’s not easy need to be sociable. It’s not a need created by the turn-of-the-century granite fortress of a building, – to look for someone with the same taste in Web, but it hasn’t gone away either. Sulake’s guests are received at an oddly curving front desk music on an American community website with thing is community-based entertainment. People in electric-blue plastic. And then greeted by Timo 274,000 groups based around music. And even if are the best entertainment,” Soininen says. Soininen who appears on the run. your interests are slightly more esoteric, such as Although the dinosaurs are tottering, this is just Soininen is head of the Sulake Corporation, history or science, that still leaves 8,200 groups. the beginning. That is what Soininen believes. which accounts for a good one-fifth of the Taivas Sulake’s business idea draws its power from “It’s astounding what amazing things people Innovations investment portfolio. Its most the vastness of the Internet and its unbridled can come up with.” important product is Habbo, a virtual world in growth.
    [Show full text]
  • Griffiths, Marie, & Light, Ben
    This may be the author’s version of a work that was submitted/accepted for publication in the following source: Griffiths, Marie & Light, Ben (2008) Social networking and digital gaming media convergence : Classification and its consequences for appropriation. Information Systems Frontiers, 10(4), pp. 447-459. This file was downloaded from: https://eprints.qut.edu.au/75712/ c Copyright 2008 Springer, Part of Springer Science+Business Me- dia. This work is covered by copyright. Unless the document is being made available under a Creative Commons Licence, you must assume that re-use is limited to personal use and that permission from the copyright owner must be obtained for all other uses. If the docu- ment is available under a Creative Commons License (or other specified license) then refer to the Licence for details of permitted re-use. It is a condition of access that users recog- nise and abide by the legal requirements associated with these rights. If you believe that this work infringes copyright please provide details by email to [email protected] Notice: Please note that this document may not be the Version of Record (i.e. published version) of the work. Author manuscript versions (as Sub- mitted for peer review or as Accepted for publication after peer review) can be identified by an absence of publisher branding and/or typeset appear- ance. If there is any doubt, please refer to the published source. https://doi.org/10.1007/s10796-008-9105-4 Griffiths, Marie, & Light, Ben. (2008). Social networking and digital gaming media convergence: Classification and its consequences for appropriation.
    [Show full text]
  • Commission Nationale De L'informatique ET Des Libertés
    activity report COMMISSION NATIONALE DE L’INFORMATIQUE ET DES LIBERTÉS coMMISSioN NatioNALE DE L’INForMatiQUE et DES LIBertÉS ACTIVITY REPORT 2011 As provided by Article 11 of the Law of 6 January 1978, amended by the Law of 6 August 2004 In pursuance with the Law of 11 March 1957 (Article 41) and the Code of Intellectual Property of 1 July 1992, any reproduction, whether wholly or partially, of this publication for collective usage is strictly prohibited without the express authorization of the publisher. As a reminder, the abusive and collective use of photocopies jeopardizes the economic balance of the book publishing industry. © Direction de l’information légale et administrative – Paris, 2012 ISBN 78-2-11-008039-4 DECISIONS AND DELIBERATIONS 11 2 REJECTED WAIVERS OF AUTHORIZATIONS NOTIFICATION 1,969 249 93 1 DECISIONS & AUTHORIZATIONS, OPINIONS ISSUED, RECOMMENDATION DELIBERATIONS INCLUDING 6 SINGLE INCLUDING ON POLITICAL ADOPTED AUTHORIZATIONS 1 OPINION ON A COMMUNICATION (+ 25.5% versus 2010) SINGLE REGULATION 2011 KEY FIGURES NOTICES TO COMPLY & SANCTIONS PRIOR FORMALITIES 65 5 5,993 4,483 NOTICES TO COMPLY FINANCIAL FINES NOTIFICATIONS ON NOTIFICATIONS ON VIDEO-SURVEILLANCE GEOLOCATION SYSTEMS SYSTEMS (+33.5 versus 2010) 13 2 (+37% versus 2010) WARNINGS ACQUITTALS 744 AUTHORIZATIONS ON BIOMETRIC DEVICES (+5.4% versus 2010) COMPLAINTS & REQUESTS FOR INDIRECT RIGHT OF ACCESS CONTROLS & AUDITS 5,738 2,099 COMPLAINTS REQUESTS FOR INDIRECT 385 151 (+19% versus 2010) ACCESS TO POLICE AND AUDITS VIDEOPROTECTION INTELLIGENCE RECORDS (+25% versus 2010) AUDITS (+12% versus 2010) CORRESPONDENTS 8,635 ORGANIZATIONS HAVE APPOINTED A DATA PROTECTION OFFICER (CIL) (+25% versus 2010) TABLE OF COntents Foreword for the President A word from the Secretary General 1.
    [Show full text]
  • Of Habbo Hotel
    An Interdisciplinary Journal on Humans in ICT Environments ISSN: 1795-6889 www.humantechnology.jyu.fi Volume 3 (2), May 2007, 127–153 UNSCRAMBLING THE “AVERAGE USER” OF HABBO HOTEL Mikael Johnson Helsinki Institute for Information Technology Helsinki University of Technology and University of Helsinki Finland Abstract: The “user” is an ambiguous concept in human-computer interaction and information systems. Analyses of users as social actors, participants, or configured users delineate approaches to studying design-use relationships. Here, a developer’s reference to a figure of speech, termed the “average user,” is contrasted with design guidelines. The aim is to create an understanding about categorization practices in design through a case study about the virtual community, Habbo Hotel. A qualitative analysis highlighted not only the meaning of the “average user,” but also the work that both the developer and the category contribute to this meaning. The average user a) represents the unknown, b) influences the boundaries of the target user groups, c) legitimizes the designer to disregard marginal user feedback, and d) keeps the design space open, thus allowing for creativity. The analysis shows how design and use are intertwined and highlights the developers’ role in governing different users’ interests. Keywords: design-use relationships, user, designer, categorization practices. INTRODUCTION Designers and users are commonly treated as trivial roles in research on design processes, but the question, “Who are the users?” is far from trivial. Take, for instance, the case in this paper, the on-line chat and game environment Habbo Hotel. Should the users be defined as the Internet surfers who visit the hotel at least once a month? This is the designation of users when discussing popular Web site statistics.
    [Show full text]